Trusted Design

TA0001 - Initial Access

戦術「Initial Access」に関連する攻撃手法(Technique)の一覧です。

Technique ID Name Description
T1189 Drive-by Compromise Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. Multiple w…
T1190 Exploit Public-Facing Application Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The we…
T1192 Spearphishing Link Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in t…
T1193 Spearphishing Attachment Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms …
T1194 Spearphishing via Service Spearphishing via service is a specific variant of spearphishing. It is different from other forms of spearphishing in t…
T1195 Supply Chain Compromise Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose …
T1195.001 Compromise Software Dependencies and Development Tools Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purp…
T1195.002 Compromise Software Supply Chain Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system c…
T1195.003 Compromise Hardware Supply Chain Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data …
T1199 Trusted Relationship Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted t…
T1200 Hardware Additions Adversaries may physically introduce computer accessories, networking hardware, or other computing devices into a system…
T1566 Phishing Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delive…
T1566.001 Spearphishing Attachment Adversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Sp…
T1566.002 Spearphishing Link Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphi…
T1566.003 Spearphishing via Service Adversaries may send spearphishing messages via third-party services in an attempt to gain access to victim systems. Spe…
T1566.004 Spearphishing Voice Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific …
T1659 Content Injection Adversaries may gain access and continuously communicate with victims by injecting malicious content into systems throug…
T1669 Wi-Fi Networks Adversaries may gain initial access to target systems by connecting to wireless networks. They may accomplish this by ex…